Abstract
In this paper we demonstrate how the formal model constructed in our previous work [1], can be modified in order to analyse additional Buyer-Seller Watermarking Protocols, identifying which specific sections of the CSP scripts remain identical and which require modification. First, we model the protocol proposed by Memon and Wong [2], an examplar of the Offline Watermarking Authority (OFWA) Model, defined in the framework by Poh and Martin [3]. Second, we model the Shao protocol [4] as an example of a protocol fitting the Online Watermarking Authority (ONWA) Model. Our analysis of the protocols reaffirms the unbinding attack described by Lei et al.[5] on the Memon and Wong protocol and we identify a new unbinding attack on the protocol proposed by Shao.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Williams, D.M., Treharne, H., Ho, A.T.S., Culnane, C.: Using a formal analysis technique to identify an unbinding attack on a buyer-seller watermarking protocol
Memon, N., Wong, P.W.: A buyer seller watermarking protocol. IEEE Transactions on Image Processing 10(4), 643–649 (2001)
Poh, G.S., Martin, K.M.: A framework for design and analysis of asymmetric fingerprinting protocols. In: Third International Symposium on Information Assurance and Security, pp. 457–461 (2007)
Shao, M.H.: A privacy-preserving buyer-seller watermarking protocol with semi-trust third party
Lei, C.L., Yu, P.L., Tsai, P.L., Chan, M.H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing 13(12), 1618–1626 (2004)
Qiao, L., Nahrstedt, K.: Watermarking schemes and protocols for protecting rightful ownership and customer’s rights. Journal of Visual Communication and Image Representation 9(3), 194–210 (1998)
Roscoe, A.W., Ryan, P., Schneider, S., Goldsmith, M., Lowe, G.: The Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2001)
Ibrahim, I.M., Nour El-Din, S.H., Hegazy, A.F.A.: An effective and secure buyer seller watermarking protocol. In: Third International Symposium on Information Assurance and Security, pp. 21–28 (2007)
Hoare, C.A.R.: Communicating sequential processes. Prentice-Hall International, Englewood Cliffs (1985)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Cox, I.J., Miller, L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)
Housley, R., Ford, W., Polk, W., Solo, D.: Internet x.509 public key infrastructure certificate and crl profile (1999)
Formal Systems. FDR 2.82. Formal Systems Ltd. (2005)
Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice Hall, Englewood Cliffs (1998)
Lowe, G.: Breaking and fixing the needham-schroeder public-key protocol using fdr. In: Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems, pp. 147–166 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Williams, D.M., Treharne, H., Ho, A.T.S., Waller, A. (2009). Formal Analysis of Two Buyer-Seller Watermarking Protocols. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-04438-0_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04437-3
Online ISBN: 978-3-642-04438-0
eBook Packages: Computer ScienceComputer Science (R0)